You are on page 1of 8

Question Option1 Option2 Option3 Option4

Which of the following activity is not considered as a Cyber Crime? Password Trafficking Trademark Counterfeiting Desktop Forgery Desktop Evulsion

Cyber criminal created virus named ______ and spread over the internet to celebrate Valentine’s Day in advance
Happy Valentine’s Day I Love You Nightman Melissa
in the year 2000

Section 80 is applied to only those offence which are defined under the ____. IT Act 2000 IT Act 2003 IPC 2000 Code of Criminal Procedure 1999

An offence is in which as accused is arrested with a warrant is called Cognizable offences Non-cognizable offences Criminal offence Punishment

An offence is in which as accused is arrested without a warrant is called Cognizable offences Non-cognizable offences Criminal offence Punishment

The word ________ are referred to situation where a person is caught in the process of commission of an offence
“having committed” “about to commit” “of committing” “being committed”
which has not yet concluded.

The word ______ are referred to a situation where the offence has been concluded “having committed” “about to commit” “of committing” “being committed”

Which of the following is not type of Hacking? Code Hackers Phreaker Cyberpunk and Crackers Mischiefer

What is full form of FIR? Fastest Investigation Report First Investigation Report First Information Report First Information Request

Which of the following is not motivation for teenagers to attract towards cyber crime? Hungry for fame and publicity Excitement for achieving some great Lack of fear Deep knowledge of Law

Definition of ‘Cheating’ is explained in ___. Section 415 Section 416 Section 417 Section 418

As per Section 43 ______ means to destroy, alter, delete, add, modify or rearrange any computer resourses by any
Hacking Cheating Virus Damage
mean.

Mischief is explained in _____ IPC 422 IPC 423 IPC 424 IPC 425

Under Section 67 of an Information Tchnology Act 2000 __ years imprisonment and fine up-to 5 lakhs is for Cyber
1 3 5 7
Pornography.

Under Section 70B of an Information Tchnology Act 2000 __ years imprisonment and or fine. 1 3 5 7

“Doctor Nuker” is known as _____ in Cyber World introduced by Pakistan. Group of Cyber Crime protectors Group of Cyber Attack protectors Group of Hackers Group of Doctors

Full form of TADA is ____. Terrorist Arrest Disruptive Act Terror Activities Disruptive Act Terrorist and Disruptive Activities Act Terrorist Activities Disruptive Act

The Cyber Appellate Tribunal shall have same power as are vested in a civil court under _______. Code of Conduct Code of Civil Procedure Indian Cyber Code Code of Civil Court

___ shall have powers to regulate its own procedure including the place at which it shall have its sitting. The Cyber Appellate Tribunal The originator The Judge The court

If any country hacks computer, computer system or network in India then ______ of IT Act is applied. Section 66 Section 77 Section 80 Section 177

Section 66-C : Sending offensive


Section 66-B : Dishonestly receiving stolen
Select the odd (wrong) combination from the following Section 65 : Tampering with computer source code Section 66 : Computer related offences message through communication
computer resource
device
Section 66F : Imprisonment up to
Section 66A : Imprisonment up to 3 years and / or Section 66B : Imprisonment up to 3 years Section 66D : Imprisonment up to 3 years
Select the odd (wrong) combination from the following 3 years and / or fine up to ₹ 1
fine up to ₹ 1 Lakh and / or fine up to ₹ 1 Lakh and / or fine up to ₹ 1 Lakh
Lakh

Section 71 : Imprisonment up to 2 years and / or fine Section 72 : Imprisonment up to 2 years Section 72A : Imprisonment up to 2 years Section 73: Imprisonment up to 2
Select the odd (wrong) combination from the following
up to ₹ 1 Lakh and / or fine up to ₹ 1 Lakh and / or fine up to ₹ 1 Lakh years and / or fine up to ₹ 1 Lakh

Section71: Misrepresentation to the controller to the Section72: Breach of confidentiality and Section73: Disclosure of information in Section74: Publication for
Select the odd (wrong) combination from the following
certifying authority privacy breach of lawful contract fraudulent purpose
Section 68 : Imprisonment up to 2 years and fine up Section 68A : Imprisonment up to 2 Section 69: Imprisonment up to 7 years and Section 69A: Imprisonment up to
Select the odd (wrong) combination from the following
to ₹ 1 Lakh years and fine up to ₹ 1 Lakh fine 7 years and fine

Which of the following is not a type of cyber-crime? Data theft Forgery Damage to data and systems Installing antivirus for protection

Those who have knowledge of intricacies Those who have knowledge of intricacies of
Who are the code hackers? Those who have the knowledge of coding language. Who have Knowledge of internet
of computer systems and their computer systems and their operations.
operations.
In which year India’s IT Act came into existence? 2003 2001 2002 2000

Non cognizable offence is an offence in which a police-officer cannot arrest any person without Notice Warrant Authority Letter Permission

Who are not the authority for justice dispensation system for cybercrimes? Controller of Certifying Authorities Certifying Authority High Court Adjudicating Officer

Which section 0f IT Act 2000 defines punishment for hacking? 77(3) 80(1) 66(1) 90(2)
Question Option1 Option2 Option3 Option4

Which of these is not type of E-Commerce transaction? Information Access Interpersonal Communication Shopping Services Horizontal Enterprises

non-disclosure or confidentiality clause stated in employment contract sale of good act 1930 arbitary act data protection act

Software licence is ________________ exclusive right non-exclusive static movable

An e-contract is a contract modeled, specify executed and deployed by _____. software system software developer online companies e-government

________ is a person sends, generates, stores and transmits messages Addressee Originator Developer Receiver

Three main methods of contracting electronically are email, world wide web and ________ contract Soft system cyber technical

In section2(a) of Indian Contract Act _________ is defined as website advertisements are invitation Offer Contract Contact Deal

__________ Jurisdiction implies jurisdiction based upon monetary limit. Pecunairy Subject Matter Territotial Appellate

The concept of ________________ has been explained by the courts time and again. Cause of action Law Judgement Remedy

Conclusion of ________ contract is made by breaking by seal to bind Electronic Soft Shrink and wrap Click and wrap

_________ contract allow user to read the term before accepting it. Electronic Soft Shrink and wrap Click and wrap

The person making proposal is known as _____ and the person accepting it is known as ________ promisor, promise promisee, originator addressee, originator promisor, addressee

_______ may be used to specify the legal rules that will govern a contract. Governing Law Clause Limitations of Liabilities Warranties Arbitration Clause

the law of contract is stated in indian contract act 1872 sale of good act 1930 indian contract act 1972 Consumer act

The purpose of ____ is to define the material embodiment of a contract. Entire Agreement Clause Software License Agreement Confidentiality Clause Arbitration Clause

As per ________ a suit related to immovable property is needed to be instituted in the court whose jurisdiction the
CPC 1906 CPC 1907 CPC 1908 CPC 1909
property is situated

Cause of action contains the circumstances forming the infringement of the right making of meaningful laws area of jurisdiction agreement

In contract not each and every place is connected that would have jurisdiction based on the principles of ______ Cause of action Making of contract Making parties Jurisdiction of India

_______ in relation to a body corporate, means the place where it is registered. Usual place of residence Place of Jurisdiction Place of crime Any place in world

The _____ a suite for compensation for wrong to immovable property is held by the defendant. Section 16 of CPC, 1908 Section 16 of CPC, 1909 Section 32 of CPC, 1908 Section 32 of CPC, 1909

_____is complete when it comes to the knowledge of the person to whom it is made. Acceptance of contract The agreement The communication of a proposal Entire Agreement

Two or more persons are said to _______ when they agree upon the same thing in the same sense. Consent Coercion Addressee Contractor

A _____ is a contract to do or not to do something, if some event, collateral to such contract, does or does not happen. Lump Sum Contract Unit Price Contract Contingent contract Incentive Contract

There are three types of jurisdiction generally recognized in international law. Which of the following is not type of
the jurisdiction to adjudicate the jurisdiction to prescribe the jurisdiction to correct the jurisdiction to enforce
Jurisdiction?
____statute is a statute that allows for a court to obtain personal jurisdiction over an out-of-state defendant on the
A Long Arm A Legal Arm A Short Arm A Court Arm
basis of certain acts committed by an out-of-state defendant, provided that the defendant has a sufficient connection
with the state.
EULA stands for? End-User Agreement End-License Agreement End-User License Agreement End-User Loyalty Agreement

EDI stands for Electronic Data Interchange Electronic Data Intersect Electronic Domain Interchange Electronic Data Internet
Contract formation on internet determine Time and place System Contract Name

Confidentiality clause define Agreement Contract Document Seek to protect intellectual property
Question Option1 Option2 Option3 Option4

DNS stands for Domain Name System Domain Name Source Domain Name Service Domain Name Search

Unauthorized use of trademark is known as Cyber Haking Cyber-squatting Hacking Cyber Spacing

Uniform Domain Name Dispute Unique Domain Name Dispute


UDRP stands for Uniform Dispute Resolution Policy Name Resolution Policy
Resolution Policy Resolution Policy
Internet Corporation for Assigned Internet Connection for Assigned Intranet Corporation for Assigned Interlink Corporation for Allocated
ICANN stands for
Names and Numbers Names and Numbers Names and Numbers and Symbol Names and Numbers
Anti-cybersquatting Council Anti-cybersquatting Consumer Anti-cybersquatting
In Case of Cyber Squatting ACAP stands for Agile Cyber security Action Plan
Protection Act Protection Act Communication Protection Act

Un-authorized use of other’s trademark which may leads to trademark infringement and or passing-off is known as Meta-tagging Meta-Hacking Meta-Fixing Meta-Catching

Under the _______ burden of proving bad faith registration is not heavy. ICANN UDRP STOP NASSCOM

National Alteration of Software and Non Association of Software and National Association of System National Association of System
NASSCOM stands for
Service Companies Service Companies and Service Companies and Squatting Companies
Repeate Instrumental Association of Rework Industry Allocated of Recording Industry Association of
Trademark related Organization RIAA stands for Recording Industry Association of Africa
America America America

The remedies available for infringement of copyright does NOT include which of the following Injunction Account of profits Rectification Damages

Which of the following is not civil remedies. Intriocutory injunction Precuniary remedies Mareva injunction Criminal remedies

The 'apple' logo of the Apple Corporation is an example of which of the following Copyright Patent Design right A trade mark

IT Act-2000 stands for Information Tech Act -2000 Indian Technology Act -2000 International Technology Act -2000 Information Technology Act -2000

By the use of Napster leads to major forms of harm to Film Industry Music Industry Video Industry Digital Industry

A company wishes to ensure that no one else can use their logo. Copy rights Trade mark Patent Industrial designs

The term of copyright for an author lasts how long? The life of the author The life of the author plus 60 years 95 years 75 years

Which of following would not gain copyright protection? A DVD An unrecorded speech Written lyrics of a song A hand knitted jumper

To borrow a CD from a friend and To purchase a CD and copy it to


Which one of the following actions is not a breach of copyright To import copied CDs To make a copy of a CD and sell it
copy it to your laptop for your own your laptop for your own private
private use use.
The act of unauthorized copying or downloading of a program from a network and making multiple copies of it is Plagiarism Network piracy Software piracy Site-license piracy

Typological arrangements of
Napster and Its Cousins Case Related to Ideas Music and broadcasts Dramatic productions
published editions

Napster and Its Cousins has developed system is called as Peer to peer Link to link Share To Share Host to Host

Conclusion of an alternative for Napster SongsPk Digital Library Digital Songs Free Songs for All

Imprisonment upto 3 years but not less Fine which may not be less than Search and seizure of infringing Cancellation of delivery infringing
Under Copyright act , 1957 which remedies are not provided for infringement
than 6 month 50000 but may extended up to goods goods to the copy right owner
200000.
___________is a link to another website is displayed within a window or frame. Surface linking Framing Downloading Deep linking

Media campaigning against piracy Strict implementation of the code


Which of the following policies not adopted to decline software piracy Imports duty on software are removed. Prices of software are increased
process of conduct for member companies
of NASSCOM
A company wishes to ensure that no one else can use their logo. Copy rights Trade mark Patent Industrial designs

Copyright act enacted in 1958 1956 1960


Who administer UDRP? WTO 1957 Supreme Court High court
Question Option1 Option2 Option3 Option4

Organization for economic cooperation Open Economy cooperation and


OECD stands for---------------------- Openly Economy cooperation and deployment Organization for entity Development
and Development Development

The income which falls under the head “------------“ ,if it is earned Interest Tax Salary Spend

Digital signatures are based on -------key encryption Cypher text Hash key Private key Public Key

Digital Signature Certificate can not be suspended for a Period exceeding -----------days unless a subscriber has been
15 25 30 10
given an opportunity of being heard in the matter

The suspension of Digital Signature Certificate is required to be communicated to the subscriber by the----------- Any Sector Private Authority Certifying Authority Public authority

----------- means property of every description except immovable property Static Property Portable property Movable Property Fix property

----------- is broadly defined as payments of any kind in consideration for services of managerial technical or consultancy
FTS FTP PTS FAA
nature except the payments for independent personal services

TAG stands for ------------- Technical Advertisement Group Technical Advisory Group Technological Advisory Group Technological Advertisement Group

FTS stands for--------------- Fundamental Target service Fees for temporary Service Fundamental technique service Fees for technical service

Section 161 of the Income Tax Act,1961 defines --------- The liability of a representative assesse Recovery of tax Direct Assessment Right of representative assesse to recover tax paid

The applicant is in the course of being A receiver is not appointed by court in The controller has invoked a performance bond or A certifying authority fails to comply with the directions of the
Which one of the following is not Rule 17 of the Certifying Authorities Rules,2000
wound up the respect of applicant banker’s guarantee controller

CA stands for-----------,who issues digital certificate Certification Authority Charted Accountant Certified Application Certified Anatomy

-------- implies a smoother interface between government and citizen E-Commerce E-Governance C to C Commerce E-Media

------------ serves as an Identity of an individual for certain purpose Copy right Digital copy E-Copy Digital Signature

---------- enables publication of rule ,regulation ,order,bye- law, Section 6 of the IT Act,2000 Section 7 of the IT Act,2000 Section 9 of the IT Act,2000 Section 8 of the IT Act,2000

Which one of the following is model of tax treaties which serves as a guide for DTAAs OECD Model treaty Tug of war ACID model OPD Model

-------------------is based on ideology that developing countries are mostly net importers PE United Nations Treaty UNF Unified Law

Types of DTAA Comprehensive and Limited Open source and Unlimited Integrated and Shortened None

The encryption of hash result of the message with the private key of the sender is called------------- Cryptography Digital documentary Digital signature Public key

Land Record system PRISM is in---------- Panchgani Punjab Aasam Uttar Pradesh

------------has recognized that it is rare that an ISP would have any authority to enter into binding contract on behalf of
GIIC UN model OECD Model Treaty BNCC
customer

Which one of the following is basic principle of taxation internationally Residence base taxation Non residence taxation Destination Based Taxation Basic Transformation

A multi utility bill paying counter termed --------- FRIENDS PRISM RICH BELL

-------- as a person who has been granted a license to issue Digital Signature certificate Officer Agent Owner Certifying Authority

The IT minister Mr.Pramod Mahajan has declared the year 2001as the year of ---------- Recession Digital E-Governance Mega World

Organization for Economic Corporation


OECD stands for Organization for Economic Developmental Organization and Educational Corporation Organization corporation
Development

Indian income tax act was enacted in 1961 1962 1963 1964
Digital signatures created and verified using Program Graphical coding Html Cryptography

DTAA stands for Double tax agreement act Double tax avoidance agreement Double tax apply agreement Double tax application agent

Asymmetric cryptosystem is known as Public key cryptography Protected key cryptography Encryption Internal key encryption

Section 12 and 13 of IT Act 2000 signifies Proposal License Contract formation Refusal of work

Controller of Certifying Authorities(CCA) works under Prime Minister Office Reserve Bank of India Ministry of communication &IT autonomous body

He/She is in India in the previous year He/She is in India for period of 70 days or He/She is in India in the previous year for a period of He/She is in India for period of 70 days or more during the previous and
An individual is said to be resident in India if
for a period of 182 days or more more during the previous and 365 days or 180 days or more 361 days or more during the four years immediately preceding previous
more during the four years immediately year
Revocation of digital signature certificate defined in Section 38 Section
preceding 39 year
previous Section 40 Section 41

Which model is not a part of Permanent Establishment? UN model OECD model US model ISN model

income is taxed in many countries but credit for tax


In which case two countries have an agreement for double tax avoidance income is taxed only one country no exempt in both countries income is taxed in boundries
unpaid

e-governance define e-records signature e-records and signature IT act

You might also like